ACM DL

Software Engineering and Methodology (TOSEM)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 24 Issue 2, December 2014

Residual Investigation: Predictive and Precise Bug Detection
Kaituo Li, Christoph Reichenbach, Christoph Csallner, Yannis Smaragdakis
Article No.: 7
DOI: 10.1145/2656201

We introduce the concept of residual investigation for program analysis. A residual investigation is a dynamic check installed as a result of running a static analysis that reports a possible program error. The purpose is to observe...

A Large-Scale Evaluation of Automated Unit Test Generation Using EvoSuite
Gordon Fraser, Andrea Arcuri
Article No.: 8
DOI: 10.1145/2685612

Research on software testing produces many innovative automated techniques, but because software testing is by necessity incomplete and approximate, any new technique faces the challenge of an empirical assessment. In the past, we have...

Conditional Commitments: Reasoning and Model Checking
Warda El Kholy, Jamal Bentahar, Mohamed EL Menshawy, Hongyang Qu, Rachida Dssouli
Article No.: 9
DOI: 10.1145/2685613

While modeling interactions using social commitments provides a fundamental basis for capturing flexible and declarative interactions and helps in addressing the challenge of ensuring compliance with specifications, the designers of the system...

A Unified Test Case Prioritization Approach
Dan Hao, Lingming Zhang, Lu Zhang, Gregg Rothermel, Hong Mei
Article No.: 10
DOI: 10.1145/2685614

Test case prioritization techniques attempt to reorder test cases in a manner that increases the rate at which faults are detected during regression testing. Coverage-based test case prioritization techniques typically use one of two overall...

Formal Verification of Software Countermeasures against Side-Channel Attacks
Hassan Eldib, Chao Wang, Patrick Schaumont
Article No.: 11
DOI: 10.1145/2685616

A common strategy for designing countermeasures against power-analysis-based side-channel attacks is using random masking techniques to remove the statistical dependency between sensitive data and side-channel emissions. However, this...

When and How to Use Multilevel Modelling
Juan De Lara, Esther Guerra, Jesús Sánchez Cuadrado
Article No.: 12
DOI: 10.1145/2685615

Model-Driven Engineering (MDE) promotes models as the primary artefacts in the software development process, from which code for the final application is derived. Standard approaches to MDE (like those based on MOF or EMF) advocate a two-level...